Enxhia Sala – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania

Edlira Martiri – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania

 

Keywords:
Theoretical frameworks;
Information security;
Privacy;
Mobile technology

DOI: https://doi.org/10.31410/LIMEN.2023.311

Abstract: This paper provides a comprehensive exploration of theoretical frameworks essential for understanding smartphone users’ security behav­ior. It delves into the Decomposed Theory of Planned Behavior (DTPB), Tech­nology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Human-Computer Interaction (HCI). Every framework provides distinct per­spectives on the implementation, acceptance, and usage of security meas­ures. Through the integration of these frameworks, researchers get an in-depth understanding of the elements that impact behavioral intentions and actions in the domain of smartphone security. The paper also highlights the evolution and expansion of these frameworks over time, emphasizing their relevance in contemporary research and practical applications. Moreover, it outlines prospective directions for research, such as examining the interac­tion between developing technology and perceptions of security, evaluat­ing the impact of cultural factors on security practices, and assessing the ef­ficacy of interventions.

Download file

LIMEN Conference

9th International Scientific-Business Conference – LIMEN 2023 – Leadership, Innovation, Management and Economics: Integrated Politics of Research – CONFERENCE PROCEEDINGS, Hybrid (Graz University of Technology, Graz, Austria), December 7, 2023

LIMEN Conference Proceedings published by the Association of Economists and Managers of the Balkans, Belgrade, Serbia

LIMEN Conference 2023 Conference Proceedings: ISBN 978-86-80194-78-3, ISSN 2683-6149, DOI: https://doi.org/10.31410/LIMEN.2023

Creative Commons Non Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission. 

Suggested citation

Sala, E., & Martiri, E. (2023). Exploring Theoretical Frameworks for Analyzing the Security Behavior of Smartphone Users. In V. Bevanda (Ed.), International Scientific-Business Conference – LIMEN 2023: Vol 9. Conference Proceedings (pp. 311-321). Association of Economists and Managers of the Balkans. https://doi.org/10.31410/LIMEN.2023.311

References

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-T 

Ajzen, I. (2011). The theory of planned behaviour: Reactions and reflections. Psychology & Health, 26(9), 1113-1127.

Al-Gahtani, S. S. (2016). Empirical investigation of e-learning acceptance and assimilation: A structural equation model. Applied Computing and Informatics, 12(1), 27-50.

Arkesteijn, K., & Oerlemans, L. (2005). The early adoption of green power by Dutch house­holds. Energy Policy, 33(2), 183-196.

Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.

Boer, R. (2005). Trends in continuum mechanics of porous media (Vol. 18). Springer Science & Business Media.

Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems us­ers have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864.

Carroll, J. M. (2014). Human Computer Interaction – brief intro. Interaction Design Founda­tion – IxDF.

Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual re­actions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158. doi:10.2307/249749

Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Infor­mation Technology. MIS Quarterly, 13(3), 319.

Davis, F. D. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475-487.

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technol­ogy: A Comparison of Two Theoretical Models. Management Science, 35(8), 982-1003.

Demoulin, N. T., & Coussement, K. (2020). Acceptance of text-mining systems: The signaling role of information quality. Information & Management, 57(1), 103120.

Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429. doi:10.1111/j.1559-1816.2000.tb02323.x

Franz, C. R., & Robey, D. (1986). Organisational context, user involvement, and the usefulness of information systems. Decision Sciences, 17(3), 329-356.

Gefen, Karahanna, & Straub. (2003). Trust and TAM in Online Shopping: An Integrated Mod­el. MIS Quarterly, 27(1), 51.

Ginzberg, M. J. (1981). Early Diagnosis of MIS Implementation Failure: Promising Results and Unanswered Questions. Management Science, 27(4), 459-478.

Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300-311.

Hsieh, J. J. P.-A., Rai, A., & Keil, M. (2008). Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvan­taged. MIS Quarterly, 32(1), 97-126.

Lazarus, R., & Folkman, S. (1984). Stress, appraisal, and coping. New York: Springer Publish­ing Company, Inc.

Lwin, M., & Saw, S. (2007). Protecting children from myopia: A PMT perspective for improv­ing health marketing communications. Journal of Health Communication, 12.

Monat, A., & Lazarus, R. (Eds.). (1991). Stress and coping: An anthology. New York: Colum­bia University Press.

Plotnikoff, R. C., & Trinh, L. (2010). Protection Motivation Theory. Exercise and Sport Scienc­es Reviews, 38(2), 91–98. doi:10.1097/JES.0b013e3181d49612. PMID: 20335741.

Prentice-Dunn, S., McMath, B., & Cramer, R. (2009). Protection motivation theory and stages of change in sun protective behavior. Journal of Health Psychology, 14.

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Jour­nal of Psychology, 91(1), 93–114. doi:10.1080/00223980.1975.9915803. PMID: 28136248.

Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book, 153-176.

Sharda, R., Barr, S. H., & McDonnell, J. C. (1988). Decision Support System Effectiveness: A Re­view and an Empirical Test. Management Science, 34(2), 139-159. https://doi.org/10.1287/mnsc.34.2.139  

Singh, N., Sinha, N., & Liébana-Cabanillas, F. J. (2020). Determining factors in the adoption and recommendation of mobile wallet services in India: Analysis of the effect of innova­tiveness, stress to use and social influence. International Journal of Information Manage­ment, 50, 191-205. https://doi.org/10.1016/j.ijinfomgt.2019.05.022

Taylor, S., & Todd, P. (1995a). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137-155. doi:10.1016/0167-8116(94)00019-K 

Taylor, S., & Todd, P. (1995b). Understanding information technology usage: A test of compet­ing models. Information Systems Research, 6(2), 144-176.

Van der Velde, F. W., & Van der Plight, J. (1991). AIDS-related health behavior: Coping, protec­tion, motivation, and previous behavior. Journal of Behavioral Medicine, 14(5), 429–451. doi:10.1007/bf00845103. PMID: 1744908.

Van Slyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16(3), 270–283.

Venkatesh, V., & Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences, 39(2), 273-315.

Connect with us

Association of Economists and Managers of the Balkans – UdEkoM Balkan
179 Ustanicka St, 11000 Belgrade, Republic of Serbia

https://www.udekom.org.rs/home

Udekom Balkans is a dynamic non-governmental and non-profit organization, established in 2014 with a mission to foster the growth of scientific knowledge within the Balkan region and beyond. Our primary objectives include advancing the fields of management and economics, as well as providing educational resources to our members and the wider public.

Who We Are: Our members include esteemed university professors from various scientific disciplines, postgraduate students, and experts from ministries, public administrations, private and public enterprises, multinational corporations, associations, and similar organizations.

Building Bridges Together: Over the course of ten years since our establishment, the Association of Economists and Managers of the Balkans has established impactful partnerships with more than 1,000 diverse institutions across the Balkans region and worldwide.

LIMEN conference publications are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.